Modular Training
Principal Protection; Lessons Learned was developed to support professional face-to-face training by qualified dignitary, executive or celebrity protection instructors. It is based on a modular training program comprised of unique topic areas developed to rapidly move competent students from the classroom to an operational level in a minimum amount of time. While certain topic areas are traditional “hands-on” reactive subjects such as personal defense, response to AOP, evasive driver training and firearms for protection personnel, the bulk of this program is designed to facilitate the delivery of protective services in a proactive mode. We focus on keeping the Protectee out of harm more so than learning how to fight our way out of a situation that has already been established and leveraged by an adversary. We learn from history.
If you would like to learn more about our unique training programs, or add us to your current training lineup, please supply your information on the “Contact” page. We are available to help you develop or deliver protection training according to your client’s needs.
A simple 3-day program might include modules relating to (times are flexible) :
I. Introduction (2.0 hours)
Introduction of students and instructors
Terminal exercise; an exercise designed to fail on a number of levels so that students can better understand the preventative aspects of the job.
How Protection Works (the USSS model)
Our Educational Philosophy (Prevention rather than response)
Protective Mission Elements and Objectives
Prevention of intentional injury
Prevention of unintentional injury
Prevention of medical emergency
Prevention of abduction
Prevention of embarrassment
Types of Protective Roles
Public Sector (Dignitary/PSD)
Private Sector (Executive/Celebrity)
Career path comparisons; observations and expectations
Continuing education; Firearms training (where to go and how much)
Continuing education; Offensive driver training (where to go and how much)
Continuing education; Other recommended subjects
Protective planning; “Deterrence” – the FLETC model
Personal protection unit size and scope
Scope of responsibility; organizational conflict
Scope of responsibility; touching/moving others
Scope of responsibility; displaying/handling weapons
Professionalism; setting the standard
Avoiding stereotypes; “What kind of person would kill…?”
Historical perspectives; Tiberius and Gaius
The Lessons of Antiquity; If you were Eglon’s bodyguard?
Jael; the first female assassin
Assassination of religious leaders through history
The “Invincibles”
Presidential Assassination in the US
Lincoln (1865)
Garfield (1881)
McKinley (1901)
Kennedy (1963)
Assassination Attempts; Lessons learned
Andrew Jackson
Theodore Roosevelt
FDR
Harry Truman
Gerald Ford (X2)
Ronald Reagan
Other Memorable Assassinations; Lessons learned
Franz Ferdinand
M. Gandhi
I. Gandhi
R. Gandhi
Palme/Lindh
Y. Rabin
RFK
Huey Long
Bhutto
Moscone/Milk
Selena
John Lennon
Early Protectors
Samurai/Ronin
Praetorian Guard
Vanrangian Guard
Gardes Suisses
Public Sector Programs
USSS
DSS
USMS
DoD/Capitol Police/PSWG
Foreign protection agencies/ROE
Private sector programs
CC. Our role as “Facilitators”
DD. Watching out for yourself!
EE. Q&A (Sample test questions).
II. Morning break; DT (.5/hour)
III. Advance Planning (1.5 hours)
Why important?
Getting in/around/out
Knowing the venue
Knowing the people
“Concentric Rings” theory
Elements of protective planning (awareness/avoidance/defense)
Comprehensive protection strategies
Planning for a trip
Protection checklists
Airports (commercial and G/A)
Residences
Hotels
Restaurants
Modes of travel
Routes of travel
Medical histories/HIPAA
Joint operations; working with other teams
Reporting formats/briefings
deBecker’s “LADDER” concept
Unexpected side-trips/impromptu visits
“Security assessment 101”
Thinking “3-D”
Working with onsite personnel
Identifying posts “Economy of Force”
Interior route planning/communications
Tech sweeps of occupied spaces
Pre-arranging registration/payment
Billeting the protection detail (OPSEC)
Viewing the venue orthographically
Theatres and auditoriums
Official ceremonies
CC. Protection during recreation
DD. Protection on the waterfront
EE. Commercial/industrial facility assessments
FF. Setting up the event
GG. Conducting advance briefings
HH. Identification and credentials
II. Media management
JJ. Landing zones/emergency extraction
KK. Familiarization with foreign weapons systems
LL. Online travel security/intelligence
MM. Sample exercise
OO. Q&A
III. Defensive Tactics (.5/hr)
LUNCH (1 hour)
IV. IED Search Techniques (2 hours)
Understanding cyclic patterns of terrorism
Target types/frequency
Statistics of attacks; bombs are #1
The US Bomb Data Center
History; black powder, nitro, dynamite, modern HE
What the internet shows our kids
Types of explosives (initiators, low, high)
Commercial explosives recognition
Military explosives recognition
WMD and reality
The terrorist’s arsenal
DHS Stand-off chart
Why make a bomb threat?
Why use a bomb?
Bombers vs. Hoaxers
The Shaheed
How bombs are made; “The basic circuit”
Appearance and construction
Handling bomb threat calls
Evacuation considerations
Letter/package bombs
Organizing/training search teams
“Pre-Search” bomb assessments of venues
BATF recommended search techniques
Searching vehicles
Searching aircraft
Practical exercise
Room search
Vehicle search (Graded exercise)
V. Defensive Tactics; continued (.5/hr)
VI. Detail Planning and Formations (2 hours)
Determining “appropriateness”
Warning; Nobody wants you
Protective functions
Principal/Protectee
Personal Security Officer (DL/SAIC/OIC)
Checkpoints/Posts
Surveillance/Counter-surveillance
Intelligence
Special assignment
Command post
Technical
Advance agent
Project agent
Coverage
Direct
Indirect
Concentric Rings Theory (again)
Movement considerations
“Arms reach”
Sound off-cover-evacuate
Closest agent rule
Attack recognition and response
Being ready and alert; keeping the hands up
The “Diamond” formation; theory
Fluidity and flexibility
Detail formations
1,2,3,4,5,6 agent with/without guests
Compression when entering corridors
Adjusting for the venue and route
Working receiving/rope lines
The “3-foot” rule
Defensive circle/Cave-in
Movement around corners/obstacles
Stairwells
Elevators (US and foreign)
Use of the “Zone defense”
Auditorium (seated)
Auditorium (presenting)
Aircraft seating (commercial/GA)
The “drop” (off-side/onside)
Formations and movement around vehicles
Lead car/follow car arrivals (1,2,3,4 car packages)
Signals (slow-roll, abort, all-clear etc)
Arrival/staging/alighting/debussing the package
Managing double-door vestibules
Returning to the vehicles from the venue
Protection at sea
“Sound-off” exercise
AOP video presentations
Crowd dynamics; recognizing the “odd-man-out”
The Eckman study
Fundamentals of crowd dynamics
Photographic analysis exercise
Applicable law enforcement statutes
Q&A
VII. Homework Assignment (Advance assessment on your residence)
DAY 2
I. Review of Day 1; Q&A (.5/hr)
II. Threat Assessment/Protective Intelligence (3.5 hours)
Principles of threat assessment
Method and process; dealing with humans
Workplace violence/semantics
OSHA and the safe workplace
Columbine; a threat model
Meloy’s behavior observations
Predatory
Affective
Targeted vs. Non-specific violence
Threat assessment process and management (USSS)
The targeted violence process
Identifying violence phases
Intervention strategies
Continued/enhanced monitoring
Detention/arrest of the attacker
Neutralization by force
Removal of Protectee
Alternative to violence
Strengthen security of Protectee
“Transference” issues
Inductive vs. Deductive assessment strategies
The Exceptional Case Study Project (USSS, 1998)
Recognition of attack indicators; George Sodini case (2009)
Categories of threats
Determining levels of risk
Understanding the risk/phase relationship
Inappropriate correspondence (ICC) analysis; Schuy method
deBecker’s “JACA”
Types of stalkers
Stalker motivation
Personality disorders
Relevant law enforcement statutes
Protective intelligence defined (Oatman)
Sources of useful intelligence
The intelligence process
Tactical vs. Strategic intelligence
Attack predictors
CC. Analyzing the Protectee’s visible organization
DD. COMSEC’s role in threat management
EE. The “two-edged” sword of information collection
FF. OPSEC for protection personnel
GG. Threat assessment practical exercises
LUNCH (1 Hour)
III. Defensive Tactics (.5/hr)
IV. Etiquette and Equipment (1 Hour)
Determining socially accepted behavior; preventing embarrassment
Etiquette and protocol considerations
Addressing government officials
Addressing military personnel
Addressing royalty
Addressing clergy
Protocol for official events
Understanding a campaign organization
Business attire (male and female)
Formal attire (male and female)
Dining rules at formal events
Adapting for sport and leisure
Concealment gear and armor
“Gearing down”
V. Medical Emergency Recognition and Response (1 hour)
Understanding the EMS system
The protection agent’s role in medical emergencies
Legal obligations of professional rescuers
Necessary personal characteristics
Preventing disease transmission
Types of common communicable diseases
OSHA regulations relating to health
Emergency action principles
Handling breathing emergencies
Recognition/care for heart attack
Assisting with oxygen or prescribed meds
Trauma injuries
Bumps and sprains
Assembling a first aid kit
Q&A
VI. Defensive Tactics (.5/hr)
VII. Command Post Operations (1 hour)
A quick word about the ICS
Types of command posts
COC facility needs
Command post operations and planning
Communications systems
Credentials and identification
Protection “pins”
Managing special events
Special event exercise
Q&A
VII. Homework Assignment (Advancing tomorrow’s mission)
DAY 3
I. Review of Day 2; Q&A (.5/hr)
II. Motorcade Planning and Operations (3.0 Hours)
DT skills testing is done rotational; two students at a time
Two and three vehicle packages on track or in traffic
III. Written examination (.5/hr)
LUNCH (1 Hour//can be used to complete assignment)
III. Practical Exercise (4 Hours)
Students are divided into teams and given assignments to advance. They select their own leadership and team assignments. If complex advances are used, the assignments are actually provided the night before. Students are required to:
1) Present a viable team appropriate to the assignment
2) Conduct an effective advance briefing
3) Identify primary and alternate routes
4) Run the mission
5) Self-critique